Font Size: a A A

A Design And Implement Of Trusted Computing Software Stack

Posted on:2010-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhuFull Text:PDF
GTID:2178360278966390Subject:Information security
Abstract/Summary:PDF Full Text Request
Trusted computing technology concentrates on solving the information security problems from foundation level, and takes major insecure factors into control from the source of computer, sequentially ensures the security and reliability of information. The core of the trusted computing technology is the trusted computing platform, which is a new generational software and hardware platform that can provide trusted computing service, it bases on trusted platform module, takes cryptogram technology as the support, takes secure operating system as the core, ensures the information security from the system structure. Now, the trusted computing platform technology has become a popular research area. However, the trusted computing platform can not provide enough transparency and salability to the user and application, especially in the distributed environment it does not provide a set of execution and development interfaces for the upper application, thus reduces the quality and maintain ability of the trusted system.Based on these situations, a few companies proposes the definition of the TCM software stack in order to satisfy the application system to the trust and interoperability, but the research of the TCM software stack mainly is the engineer interface based on the TCG criterion, but do not propose the architecture and main mechanisms of the TCM software stack.Main works of this paper are listed as follow:(1) With the analysis of the trusted computing technologies, this paper gives the description and definition of trusted subject, trustworthy and trusted software, which are relative to the trusted computing. (2) In-depth analysis of several key mechanisms to achieve the TCM software stack.(3) Based on above researches, the paper introduces a system realization model based on trusted computing platform, gives the detailed design of its every module.(4) Finally this paper gives the core realization of the TSS.
Keywords/Search Tags:host data safety, TCM software stack, trusted computing module
PDF Full Text Request
Related items